A Related-Key Cryptanalysis of RC4

dc.contributor.authorGrosul, Alexanderen_US
dc.contributor.authorWallach, Dan S.en_US
dc.date.accessioned2017-08-02T22:02:47Zen_US
dc.date.available2017-08-02T22:02:47Zen_US
dc.date.issued2000-06-08en_US
dc.date.noteJune 8, 2000en_US
dc.description.abstractIn this paper we present analysis of the RC4 stream cipher and show that for each 2048-bit key there exists a family of related keys, differing in one of the byte positions. The keystreams generated by RC4 for a key and its related keys are substantially similar in the initial hundred bytes before diverging. RC4 is most commonly used with a 128-bit key repeated 16 times;this variant does not suffer from the weaknesses we describe. We recommend that applications of RC4 with keys longer than 128 bits (and particularly those using the full 2048-bit keys) discard the initial 256 bytes of the keystream output.en_US
dc.format.extent13 ppen_US
dc.identifier.citationGrosul, Alexander and Wallach, Dan S.. "A Related-Key Cryptanalysis of RC4." (2000) https://hdl.handle.net/1911/96275.en_US
dc.identifier.digitalTR00-358en_US
dc.identifier.urihttps://hdl.handle.net/1911/96275en_US
dc.language.isoengen_US
dc.rightsYou are granted permission for the noncommercial reproduction, distribution, display, and performance of this technical report in any format, but this permission is only for a period of forty-five (45) days from the most recent time that you verified that this technical report is still available from the Computer Science Department of Rice University under terms that include this permission. All other rights are reserved by the author(s).en_US
dc.titleA Related-Key Cryptanalysis of RC4en_US
dc.typeTechnical reporten_US
dc.type.dcmiTexten_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
TR00-358.pdf
Size:
453.07 KB
Format:
Adobe Portable Document Format